mirror of
https://github.com/OMGeeky/advisory-db.git
synced 2026-01-02 17:46:38 +01:00
Add CVE-2021-3449 for openssl-src (#882)
This commit is contained in:
25
crates/openssl-src/RUSTSEC-0000-0000.md
Normal file
25
crates/openssl-src/RUSTSEC-0000-0000.md
Normal file
@@ -0,0 +1,25 @@
|
||||
```toml
|
||||
[advisory]
|
||||
id = "RUSTSEC-0000-0000"
|
||||
package = "openssl-src"
|
||||
aliases = ["CVE-2021-3449"]
|
||||
categories = ["denial-of-service"]
|
||||
date = "2021-05-01"
|
||||
url = "https://www.openssl.org/news/secadv/20210325.txt"
|
||||
|
||||
[versions]
|
||||
patched = [">= 111.15"]
|
||||
```
|
||||
|
||||
# NULL pointer deref in signature_algorithms processing
|
||||
|
||||
An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation
|
||||
ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits
|
||||
the signature_algorithms extension (where it was present in the initial
|
||||
ClientHello), but includes a signature_algorithms_cert extension then a NULL
|
||||
pointer dereference will result, leading to a crash and a denial of service
|
||||
attack.
|
||||
|
||||
A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which
|
||||
is the default configuration). OpenSSL TLS clients are not impacted by this
|
||||
issue.
|
||||
Reference in New Issue
Block a user